Authentication & authorization

Authentication & authorization News

View All News

Authentication & authorization Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Authentication & authorization Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Authentication & authorization

Learn to apply best practices and optimize your operations.

  • What's New in IAM Security and Strategy

    Most of the pivotal changes in identity and access management, or IAM, were discussed and developed at least ten years ago. Deployment of advanced IAM security technology has been glacial in comparison to most other security technologies because of its unavoidable complexity and its inherent intertwining with virtually every aspect of corporate IT. What's changed in recent years is that some of the use cases that push toward IAM concepts like federation and cloud-based identity stores have picked up considerable steam.

    In this three-part technical guide, we consider how enterprise IAM strategy needs to adapt so that companies can cope securely with paradigm-changing technology like cloud services, software-defined everything and the internet of things. Readers of this guide to IAM security today will learn how IAM strategy and architecture have evolved and how corporations must adapt their systems if they are to employ identity and access management effectively and safely through the next decade.

     Continue Reading

  • When your IAM policy encounters the internet of things

    Aging identity and access management tools, and technical innovations like the internet of things, make it imperative that you update your enterprise IAM policy now. Here's how. Continue Reading

  • Use AWS Data Pipeline, other tools to stop instances

    Developers can take different approaches to automatically spin up and shut down EC2 instances, either on a schedule or in response to load. Continue Reading

View All Manage

Problem Solve Authentication & authorization Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchSecurity

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

ComputerWeekly

Close